Patents by Inventor Gal Cohen
Gal Cohen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250111039Abstract: A method includes receiving, at a server from a user device, a user query to a large language model (LLM), creating an LLM query from the user query, inserting an security marker instruction into the LLM query to trigger an injection of a security marker, and sending the LLM query to the LLM. The method further includes receiving, from the LLM, an LLM response to the LLM query, evaluating the LLM response to detect whether the security marker is present in the LLM response, and setting a prompt injection signal based on whether the security marker is present in the LLM response.Type: ApplicationFiled: September 29, 2023Publication date: April 3, 2025Applicant: Intuit Inc.Inventors: Itsik Yizbak MANTIN, Ron BITTON, Yael MATHOV GOME, Gal COHEN
-
Patent number: 12199987Abstract: A method is provided for authenticating a user. A request to access a resource is received from a user agent. A cookie associated with the request is identified. The cookie includes a first subset of data that was previously used to authenticate the user. The cookie is validated based on the first subset of the data. Responsive to validating the cookie, a second subset of the data is retrieved from server-side storage. A risk decision is generated based on the first subset and the second subset. When the risk decision meets a threshold, the user is authenticated without presenting an authentication challenge, and access to the resources permitted.Type: GrantFiled: January 26, 2023Date of Patent: January 14, 2025Assignee: Intuit Inc.Inventors: Itsik Yizhak Mantin, Yaron Sheffer, Keren Simchon, Gal Cohen
-
Publication number: 20240259377Abstract: A method is provided for authenticating a user. A request to access a resource is received from a user agent. A cookie associated with the request is identified. The cookie includes a first subset of data that was previously used to authenticate the user. The cookie is validated based on the first subset of the data. Responsive to validating the cookie, a second subset of the data is retrieved from server-side storage. A risk decision is generated based on the first subset and the second subset. When the risk decision meets a threshold, the user is authenticated without presenting an authentication challenge, and access to the resources permitted.Type: ApplicationFiled: January 26, 2023Publication date: August 1, 2024Applicant: Intuit Inc.Inventors: Itsik Yizhak MANTIN, Yaron SHEFFER, Keren Simchon, Gal Cohen
-
Publication number: 20230267505Abstract: Aspects of the subject disclosure may include, for example, presenting, by a processing system including a processor, a first portion of a creative, transmitting, by the processing system, an indication of a user response to the first portion of the creative, transmitting, by the processing system, an identification of the processing system, receiving, by the processing system and based on the transmitting of the indication of the user response and the transmitting of the identification of the processing system, a second portion of the creative, and presenting, by the processing system, the second portion of the creative. Other embodiments are disclosed.Type: ApplicationFiled: February 23, 2022Publication date: August 24, 2023Applicant: Interwise Ltd.Inventors: Gal Beilis-Lev, Olga Yasovsky, Elad Izak, Gal Zeevi, Yacov Tyrkel, Gal Cohen, Kenneth Dan
-
Patent number: 11579308Abstract: A duplicate peak detector acquires and tracks a first correlation peak for a data sequence associated with a navigation satellite in a satellite navigation signal. During tracking of the first correlation peak, a second correlation peak is acquired and tracked for the same data sequence. Respective values of at least one tracking variable of the two correlation peaks are analyzed, and based on the analysis it is determined whether the first and second correlation peaks are associated with the same navigation signal or different navigation signals. If the first correlation peak and the second correlation peak are associated with the same navigation signal, tracking of one of the correlation peaks is discontinued.Type: GrantFiled: July 19, 2021Date of Patent: February 14, 2023Assignee: Regulus Cyber Ltd.Inventors: Avner Zangvil, Gal Cohen, Stanislav Gutliansky, David Ramati, Yoav Zangvil
-
Patent number: 11460586Abstract: A system and method for detecting a global navigation satellite system (GNSS) spoofing attack on a protected vehicle. The method includes receiving at least one GNSS signal; identifying a plurality of characteristics associated with at least one received GNSS signal; analyzing the plurality of characteristics; and determining, based on the analysis of the identified characteristics, whether the at least one GNSS signal is a spoofed signal.Type: GrantFiled: October 28, 2020Date of Patent: October 4, 2022Assignee: Regulus Cyber Ltd.Inventors: Yoav Zangvil, Yonatan Zur, Gal Cohen
-
Publication number: 20220236425Abstract: An attack detector for detecting attacks on a satellite navigation system obtains navigation messages extracted from satellite navigation signals and/or additional parameters of the satellite navigation signal from source devices. The obtained navigation messages and/or parameters are analyzed to detect satellite navigation spoofing attacks. An indicator is issued when an attack is detected.Type: ApplicationFiled: May 21, 2020Publication date: July 28, 2022Applicant: Regulus Cyber Ltd.Inventors: Yoav ZANGVIL, Avner ZANGVIL, Stanislav GUTLIANSKY, Dror KATALAN, Gal COHEN, Alon ATSMON
-
Patent number: 11309921Abstract: A system and method for generating a temporal map of radio frequency (RF) signals detected from a vehicle. The method includes: detecting a plurality of RF signals over a predetermined spectrum of frequencies at a first longitude, a first latitude and a first altitude; analyzing the plurality of RF signals to determine at least a first parameter associated with at least a first RF signal of the plurality of RF signals; and adding to the temporal map the first RF signal frequency, the at least a first parameter associated with the first RF signal, the first longitude, the first latitude and the first altitude.Type: GrantFiled: October 22, 2020Date of Patent: April 19, 2022Assignee: Regulus Cyber Ltd.Inventors: Yoav Zangvil, Yonatan Zur, Gal Cohen
-
Publication number: 20210405210Abstract: A duplicate peak detector acquires and tracks a first correlation peak for a data sequence associated with a navigation satellite in a satellite navigation signal. During tracking of the first correlation peak, a second correlation peak is acquired and tracked for the same data sequence. Respective values of at least one tracking variable of the two correlation peaks are analyzed, and based on the analysis it is determined whether the first and second correlation peaks are associated with the same navigation signal or different navigation signals. If the first correlation peak and the second correlation peak are associated with the same navigation signal, tracking of one of the correlation peaks is discontinued.Type: ApplicationFiled: July 19, 2021Publication date: December 30, 2021Applicant: Regulus Cyber Ltd.Inventors: Avner ZANGVIL, Gal COHEN, Stanislav GUTLIANSKY, David RAMATI, Yoav ZANGVIL
-
Publication number: 20210382179Abstract: A device for mitigating satellite navigation spoofing includes processing circuitry which detects correlation peaks for PRNs in a satellite navigation signal. The TOAs of subframes of navigation messages associated with each of correlation peaks are recorded and analyzed to determine if they fall within a specified time window. Based on the analysis, the correlation peaks are classified as legitimate or as spoofed. A correct geographic location is computed from the navigation data associated with the legitimate correlation peaks. Corresponding methods for mitigating satellite navigation spoofing may be embodied in a hardware-based GNSS receiver and in a software-based GNSS receiver.Type: ApplicationFiled: August 18, 2021Publication date: December 9, 2021Applicant: Regulus Cyber Ltd.Inventors: Gal COHEN, Yoav ZANGVIL, Stanislav GUTLIANSKY, Dror KATALAN, Avner ZANGVIL
-
Patent number: 11119221Abstract: A device for mitigating satellite navigation spoofing includes processing circuitry which detects correlation peaks for PRNs in a satellite navigation signal. The TOAs of subframes of navigation messages associated with each of correlation peaks are recorded and analyzed to determine if they fall within a specified time window. Based on the analysis, the correlation peaks are classified as legitimate or as spoofed. A correct geographic location is computed from the navigation data associated with the legitimate correlation peaks. Corresponding methods for mitigating satellite navigation spoofing may be embodied in a hardware-based GNSS receiver and in a software-based GNSS receiver.Type: GrantFiled: November 17, 2020Date of Patent: September 14, 2021Assignee: Regulus Cyber Ltd.Inventors: Gal Cohen, Yoav Zangvil, Stanislav Gutliansky, Dror Katalan, Avner Zangvil
-
Patent number: 11086021Abstract: A duplicate peak detector acquires and tracks a first correlation peak for a data sequence associated with a navigation satellite in a satellite navigation signal. During tracking of the first correlation peak, a second correlation peak is acquired and tracked for the same data sequence. Respective values of at least one tracking variable of the two correlation peaks are analyzed, and based on the analysis it is determined whether the first and second correlation peaks are associated with the same navigation signal or different navigation signals. If the first correlation peak and the second correlation peak are associated with the same navigation signal, tracking of one of the correlation peaks is discontinued.Type: GrantFiled: June 24, 2020Date of Patent: August 10, 2021Assignee: Regulus Cyber Ltd.Inventors: Avner Zangvil, Gal Cohen, Stanislav Gutliansky, David Ramati, Yoav Zangvil
-
Publication number: 20210109183Abstract: A system and method for generating a temporal map of radio frequency (RF) signals detected from a vehicle. The method includes: detecting a plurality of RF signals over a predetermined spectrum of frequencies at a first longitude, a first latitude and a first altitude; analyzing the plurality of RF signals to determine at least a first parameter associated with at least a first RF signal of the plurality of RF signals; and adding to the temporal map the first RF signal frequency, the at least a first parameter associated with the first RF signal, the first longitude, the first latitude and the first altitude.Type: ApplicationFiled: October 22, 2020Publication date: April 15, 2021Applicant: Regulus Cyber Ltd.Inventors: Yoav ZANGVIL, Yonatan ZUR, Gal COHEN
-
Publication number: 20210072402Abstract: A device for mitigating satellite navigation spoofing includes processing circuitry which detects correlation peaks for PRNs in a satellite navigation signal. The TOAs of subframes of navigation messages associated with each of correlation peaks are recorded and analyzed to determine if they fall within a specified time window. Based on the analysis, the correlation peaks are classified as legitimate or as spoofed. A correct geographic location is computed from the navigation data associated with the legitimate correlation peaks. Corresponding methods for mitigating satellite navigation spoofing may be embodied in a hardware-based GNSS receiver and in a software-based GNSS receiver.Type: ApplicationFiled: November 17, 2020Publication date: March 11, 2021Applicant: Regulus Cyber Ltd.Inventors: Gal COHEN, Yoav ZANGVIL, Stanislav GUTLIANSKY, Dror KATALAN, Avner ZANGVIL
-
Publication number: 20210041572Abstract: A system and method for detecting a global navigation satellite system (GNSS) spoofing attack on a protected vehicle. The method includes receiving at least one GNSS signal; identifying a plurality of characteristics associated with at least one received GNSS signal; analyzing the plurality of characteristics; and determining, based on the analysis of the identified characteristics, whether the at least one GNSS signal is a spoofed signal.Type: ApplicationFiled: October 28, 2020Publication date: February 11, 2021Applicant: Regulus Cyber Ltd.Inventors: Yoav ZANGVIL, Yonatan ZUR, Gal COHEN
-
Patent number: 10830897Abstract: A system and method for detecting a global navigation satellite system (GNSS) spoofing attack on a protected vehicle. The method includes receiving at least one GNSS signal; identifying a plurality of characteristics associated with at least one received GNSS signal; analyzing the plurality of characteristics; and determining, based on the analysis of the identified characteristics, whether the at least one GNSS signal is a spoofed signal.Type: GrantFiled: June 21, 2018Date of Patent: November 10, 2020Assignee: Regulus Cyber Ltd.Inventors: Yoav Zangvil, Yonatan Zur, Gal Cohen
-
Patent number: 10823842Abstract: A system and method for generating a temporal map of radio frequency (RF) signals detected from a vehicle. The method includes: detecting a plurality of RF signals over a predetermined spectrum of frequencies at a first longitude, a first latitude and a first altitude; analyzing the plurality of RF signals to determine at least a first parameter associated with at least a first RF signal of the plurality of RF signals; and adding to the temporal map the first RF signal frequency, the at least a first parameter associated with the first RF signal, the first longitude, the first latitude and the first altitude.Type: GrantFiled: August 6, 2018Date of Patent: November 3, 2020Assignee: Regulus Cyber Ltd.Inventors: Yoav Zangvil, Yonatan Zur, Gal Cohen
-
Patent number: 10592992Abstract: A system, method, and computer program product are provided for calculating network component value information. In use, network user information is received that is related to a plurality of network users in connection with at least one network. Such plurality of network users are organized into segments of network users, based on the network user information. Further, network usage charge information is identified that is related to charges for network usage over a predetermined amount of time, for at least one of the segments of network users. Also identified is network usage information related to network usage over the predetermined amount of time, for the at least one segment of network users. Based on this information, revenue rate information is calculated.Type: GrantFiled: November 16, 2015Date of Patent: March 17, 2020Assignees: AMDOCS DEVELOPMENT LIMITED, AMDOCS SOFTWARE SYSTEMS LIMITEDInventors: Eitan Gal, Gal Cohen, Nir Pedhazur
-
Publication number: 20190064343Abstract: A system and method for generating a temporal map of radio frequency (RF) signals detected from a vehicle. The method includes: detecting a plurality of RF signals over a predetermined spectrum of frequencies at a first longitude, a first latitude and a first altitude; analyzing the plurality of RF signals to determine at least a first parameter associated with at least a first RF signal of the plurality of RF signals; and adding to the temporal map the first RF signal frequency, the at least a first parameter associated with the first RF signal, the first longitude, the first latitude and the first altitude.Type: ApplicationFiled: August 6, 2018Publication date: February 28, 2019Applicant: Regulus Cyber Ltd.Inventors: Yoav ZANGVIL, Yonatan ZUR, Gal COHEN
-
Publication number: 20180299560Abstract: A system and method for detecting a global navigation satellite system (GNSS) spoofing attack on a protected vehicle. The method includes receiving at least one GNSS signal; identifying a plurality of characteristics associated with at least one received GNSS signal; analyzing the plurality of characteristics; and determining, based on the analysis of the identified characteristics, whether the at least one GNSS signal is a spoofed signal.Type: ApplicationFiled: June 21, 2018Publication date: October 18, 2018Applicant: Regulus Cyber Ltd.Inventors: Yoav ZANGVIL, Yonatan ZUR, Gal COHEN